Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Web Application Firewalls (WAFs): A false sense of security?

Web application firewalls (WAF) is a protection mechanism to help block potential malicious requests before they can reach the application itself. Often this is implemented as a proxy, intercepting HTTP requests, analyzing them, and finally deciding on an action. While effective, over relying on it could lead to a false sense of security that allows attackers to exploit unresolved internal issues.

A guide to understanding the UK Cyber Security and Resilience Bill

The UK government is strengthening its cybersecurity legislation with the Cyber Security and Resilience Bill (CSRB), an update to the 2018 Network and Information Systems Regulations. Modelled on the EU’s NIS2 Directive, the new Bill significantly expands cyber risk obligations across the UK’s digital ecosystem, targeting gaps exposed by recent high-profile breaches.

10 Intelligence-Focused Questions That Strengthen GRC-SOC Collaboration

The Governance, Risk, and Compliance (GRC) team and the Security Operations Center (SOC) shouldn’t be working in silos. Yet in many organizations, these teams operate with different data, priorities, and goals, missing a critical opportunity to strengthen the organization’s overall resilience. When GRC and SOC collaborate, the organization is better prepared, whether it’s responding to a real-world attack, passing an audit, or navigating the daily chaos of the cyber threat landscape.

When AI agents become admins: Rethinking privileged access in the age of AI

From resetting passwords and approving workflows to pulling HR data and orchestrating cloud infrastructure, AI agents now perform tasks that previously required a human with privileged access. AI has moved beyond the realm of passive chatbots into autonomous, persistent operations, performing work on behalf of an individual or entity. Like it or not, that makes AI agents a new part of your workforce. They hold credentials, trigger workflows, and make their own decisions.

Building Trust in AI: KnowBe4's Journey Toward ISO 42001 Certification

At KnowBe4, everything we do is built on a foundation of innovation and trust. As we bring more artificial intelligence (AI) into our human risk management platform, we believe it’s essential to be transparent and responsible every step of the way. That's why we're proud to announce that we are pursuing ISO 42001 certification, the world's first standard for managing AI systems.

Going DEEP: A Simple Framework for a Complex Problem

In our previous blog post, we discussed the behavioral science behind why people click on malicious links. So far in this series, we’ve established that our old security playbooks are broken and that we’re dealing with the complex psychology of the human brain. Trying to tackle that all at once can feel like herding cats. What we need is a simple, memorable mental map to bring structure to the chaos. Let’s go DEEP.

What is Agent2Agent (A2A) Protocol and How to Adopt it?

Imagine autonomous agents negotiating and acting on your behalf—no manual hand-offs, just an efficient, policy‑driven communication. That’s the promise of Google’s Agent2Agent (A2A) Protocol, unveiled at Google Cloud Next in April 2025. Developed with input from over 50 partners, A2A is now open-sourced under the Apache 2.0 license and governed by the Linux Foundation.

New WatchGuard Endpoint Security: Cut the Noise, See the Attack, Act Faster

We’re excited to deliver innovative improvements across the WatchGuard Endpoint Security portfolio, now available to customers and partners. Security teams face two realities at once: stealthier threats and noisier operations. This update focuses on outcomes, stronger prevention against fileless and living-off-the-land attacks, and faster, clearer investigations that reduce alert fatigue and mean time to respond (MTTR).

Your Guide to Cybersecurity Awareness Month 2025

October is here, and this means it is Cybersecurity Awareness Month (CSAM). Technology continues to advance at lightning speed, so protecting your digital life has never been more critical.‍ These blogs will walk you through the four CSAM themes designed to help you strengthen your defenses, protect your identity, and keep your family, friends and colleagues safe online.‍

Beyond Compliance: Why Continuous Threat Monitoring Pays for Itself

Compliance sets the floor, not the ceiling. Audits confirm paperwork and control intent, attackers test reality, but continuous threat monitoring closes that gap. It watches live behavior, flags anomalies, and guides a fix before damage spreads. This protects revenue, customers, and brand trust. It also streamlines operations. In this article, you will learn why a living signal beats static rules, and how it pays for itself.